Movatterモバイル変換


[0]ホーム

URL:


CN107948178A - Intelligent domestic system and information ciphering method and device, terminal - Google Patents

Intelligent domestic system and information ciphering method and device, terminal
Download PDF

Info

Publication number
CN107948178A
CN107948178ACN201711261222.9ACN201711261222ACN107948178ACN 107948178 ACN107948178 ACN 107948178ACN 201711261222 ACN201711261222 ACN 201711261222ACN 107948178 ACN107948178 ACN 107948178A
Authority
CN
China
Prior art keywords
key
gateway
control information
information
terminal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201711261222.9A
Other languages
Chinese (zh)
Inventor
毛勇
张龙
夏天松
刘泽琛
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Lumi United Technology Co Ltd
Original Assignee
Shenzhen Lumi United Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Lumi United Technology Co LtdfiledCriticalShenzhen Lumi United Technology Co Ltd
Priority to CN201711261222.9ApriorityCriticalpatent/CN107948178A/en
Publication of CN107948178ApublicationCriticalpatent/CN107948178A/en
Pendinglegal-statusCriticalCurrent

Links

Classifications

Landscapes

Abstract

Present invention is disclosed a kind of intelligent domestic system and information ciphering method and device, terminal, belong to Computer Applied Technology field.Intelligent domestic system includes terminal, gateway and home equipment, wherein:Terminal obtains the Ciphering Key Sequence Number that gateway is sent, and obtains encryption key according to key is chosen from the key sequence that it is stored according to Ciphering Key Sequence Number when generating control information according to the control operation of triggering, to be sent to gateway after control information is encrypted;Gateway is in the encryption information that receiving terminal is sent, decruption key is chosen according to the Ciphering Key Sequence Number of its transmission, encryption information to be decrypted to obtain control information, then control information is sent to relevant home equipment, so that home equipment works according to control information.In addition, additionally provide information encryption device and terminal.Above-mentioned intelligent domestic system can ensure the communication security in LAN with information ciphering method and device, terminal, improve the security that home equipment control is carried out by LAN.

Description

Intelligent home system, information encryption method and device and terminal
Technical Field
The invention relates to the technical field of computer application, in particular to an intelligent home system, an information encryption method, an information encryption device and a terminal.
Background
With the high-speed development of the intelligent home technology, more and more home devices are intelligentized. The terminals such as the mobile phone and the tablet personal computer are used as control terminals of the intelligent home, are in communication connection with the gateway, and form an intelligent home system together with the home equipment, so that intelligent control over the home equipment is achieved.
In the intelligent home system, in order to avoid the control of home equipment from being carried out by tools and ensure the safety of communication, control information needs to be encrypted. At present, when the smart home system controls the home devices, the terminal a encrypts the control information according to the preset secret key and then sends the encrypted control information to the gateway B, and then the gateway B decrypts the encrypted information through the preset secret key after acquiring the encrypted information to acquire the control information.
However, when the other terminal intercepts the encrypted information sent by the terminal a to the gateway B, after the gateway B obtains the encrypted information, although it cannot obtain the real content in the encrypted information, it may pretend that the terminal a sends the encrypted information to the gateway B at other time, so that the terminal B executes the real content in the encrypted information at wrong time, and thus the communication security in the smart home system cannot be ensured.
Disclosure of Invention
The invention provides an intelligent home system, an information encryption method, an information encryption device and a terminal, and aims to solve the technical problem of poor communication safety in the intelligent home system in the related art.
In a first aspect, an intelligent home system is provided, the intelligent home system comprising: terminal, gateway and house equipment, wherein:
the terminal acquires a key serial number sent by the gateway when generating control information according to triggered control operation, selects a key from a preset key sequence according to the key serial number to obtain an encryption key, encrypts the control information according to the encryption key and then sends the control information to the gateway;
and the gateway selects a decryption key from the key sequence according to the key serial number sent by the gateway when receiving the encrypted information sent by the terminal, decrypts the encrypted information by using the decryption key to obtain control information, and sends the control information to related household equipment so that the household equipment works according to the control information.
In a second aspect, there is provided an information encryption method, including:
the terminal acquires a key serial number sent by the gateway when generating control information according to the triggered control operation;
selecting a key from a preset key sequence according to the key sequence number to obtain an encryption key;
encrypting the control information according to the encryption key to obtain encrypted information;
and sending the encryption information to the gateway.
In a third aspect, another information encryption method is provided, including:
the gateway receives the encrypted information sent by the terminal;
responding to the receiving of the encrypted information, the gateway selects a key from a preset key sequence according to a key serial number sent to the terminal to obtain a decryption key;
decrypting the encrypted information through the decryption key to obtain control information;
and sending the control information to related household equipment so that the household equipment works according to the control information.
In a fourth aspect, there is provided an information encryption apparatus comprising:
the key serial number acquisition module is used for acquiring a key serial number sent by the gateway when the terminal generates control information according to the triggered control operation;
the encryption key selection module is used for selecting a key from a preset key sequence according to the key serial number to obtain an encryption key;
the encryption module is used for encrypting the control information according to the encryption key to obtain encrypted information;
and the encrypted information sending module is used for sending the encrypted information to the gateway.
In a fifth aspect, there is provided another information encryption apparatus comprising:
the encrypted information receiving module is used for receiving the encrypted information sent by the terminal by the gateway;
the decryption key selection module is used for responding to the reception of the encrypted information, and the gateway selects a key from a preset key sequence according to a key serial number sent to the terminal to obtain a decryption key;
the decryption module is used for decrypting the encrypted information through the decryption key to obtain control information;
and the control information sending module is used for sending the control information to the related household equipment so as to enable the household equipment to work according to the control information.
In a sixth aspect, a terminal is provided, including:
a processor; and
a memory communicatively coupled to the processor; wherein,
the memory stores readable instructions which, when executed by the processor, implement the method of the fourth aspect.
In a seventh aspect, a gateway is provided, including:
a processor; and
a memory communicatively coupled to the processor; wherein,
the memory stores readable instructions which, when executed by the processor, implement the method of the fifth aspect.
In an eighth aspect, there is provided a computer readable storage medium having stored thereon a computer program which, when executed, performs the method of the second or third aspect.
The technical scheme provided by the embodiment of the invention can obtain the following beneficial effects:
in the process of controlling the home equipment by the intelligent home system, the terminal acquires the key serial number sent by the gateway when generating control information according to the triggered control operation, selecting a key from a preset key sequence according to the key sequence number to obtain an encryption key, encrypting the control information according to the encryption key to obtain encryption information, sending the encryption information to the gateway, since the key serial number of the terminal generating the encryption key is transmitted by the gateway, the gateway can acquire the decryption key according to the key serial number, and further the control information can be smoothly recognized after being decrypted by the decryption key after receiving the encrypted information, therefore, the encryption key and the decryption key can be obtained only by informing the key serial number, other terminals in the local area network are prevented from knowing the decryption key of the encrypted information, the communication safety in the intelligent home system is ensured, and the safety of controlling related home equipment is greatly improved.
It is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory only and are not restrictive of the invention, as claimed.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the invention and together with the description, serve to explain the principles of the invention.
FIG. 1 is a schematic diagram of an implementation environment in accordance with the present disclosure.
Fig. 2 is a block diagram illustrating a terminal 100 according to an example embodiment.
Fig. 3 is a block diagram illustrating a smart home system according to an exemplary embodiment.
Fig. 4 is a block diagram of another smart home system according to the embodiment shown in fig. 3.
Fig. 5 is a flow chart illustrating a method of encrypting information according to an example embodiment.
Fig. 6 is a flowchart illustrating a specific implementation of step S110 in the information encryption method according to the corresponding embodiment in fig. 5.
Fig. 7 is a flowchart illustrating another specific implementation of step S110 in the information encryption method according to the corresponding embodiment in fig. 5.
Fig. 8 is a flow chart illustrating another method of encrypting information according to an example embodiment.
Fig. 9 is a flowchart illustrating a specific implementation of step S240 in the information encryption method according to the corresponding embodiment in fig. 8.
Fig. 10 is a schematic diagram illustrating a method for controlling home devices in an intelligent home system according to an exemplary embodiment.
Fig. 11 is a block diagram illustrating an information encryption apparatus according to an example embodiment.
Fig. 12 is a block diagram of the key serial number acquisition module 110 in the information encryption apparatus according to the corresponding exemplary embodiment shown in fig. 11.
Fig. 13 is another block diagram of the key serial number acquisition module 110 in the information encryption apparatus according to the corresponding exemplary embodiment shown in fig. 11.
Fig. 14 is a block diagram illustrating another information encryption apparatus according to an example embodiment.
Fig. 15 is a block diagram of the control information transmission module 240 in the information encryption apparatus according to the corresponding exemplary embodiment shown in fig. 14.
Detailed Description
Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. The embodiments described in the following exemplary embodiments do not represent all embodiments consistent with the present invention. Rather, they are merely examples of apparatus and methods consistent with certain aspects of the invention, as set forth in the claims below.
FIG. 1 is a schematic diagram of an implementation environment in accordance with the present disclosure. The implementation environment includes: a terminal, a gateway 200, and a router 300 for data transmission between the terminal 100 and the gateway 200.
When the terminal 100 generates the control information, the key serial number sent by the gateway 200 is obtained, and a key is selected from a preset key sequence according to the key serial number to obtain an encryption key, then the control information is encrypted according to the encryption key to obtain encryption information, the encryption information is sent to the gateway 200 through the router 300, and the gateway 200 selects a key from the preset key sequence according to the key serial number sent to the terminal 100 to obtain a decryption key, and the encryption information is decrypted through the decryption key to obtain the control information to control the relevant equipment.
The terminal 100 may be a computer device such as a mobile phone and a computer, and the specific implementation manner is not limited by this embodiment.
Fig. 2 is a block diagram illustrating a terminal 100 according to an example embodiment.
Referring to fig. 2, the terminal 100 may include one or more of the following components: a processing component 101, a memory 102, a power component 103, a multimedia component 104, an audio component 105, a sensor component 107 and a communication component 108. The above components are not all necessary, and the terminal 100 may add other components or reduce some components according to its own functional requirements, which is not limited in this embodiment.
The processing component 101 generally controls overall operations of the terminal 100, such as operations associated with display, telephone calls, data communications, camera operations, and recording operations. The processing components 101 may include one or more processors 109 to execute instructions to perform all or a portion of the above-described operations. Further, the processing component 101 may include one or more modules that facilitate interaction between the processing component 101 and other components. For example, the processing component 101 may include a multimedia module to facilitate interaction between the multimedia component 104 and the processing component 101.
The memory 102 is configured to store various types of data to support operations at the terminal 100. Examples of such data include instructions for any application or method operating on terminal 100. The Memory 102 may be implemented by any type of volatile or non-volatile Memory device or combination thereof, such as an SRAM (Static Random access Memory), an EEPROM (Electrically Erasable Programmable Read-Only Memory), an EPROM (Erasable Programmable Read-Only Memory), a PROM (Programmable Read-Only Memory), a ROM (Read-Only Memory), a magnetic Memory, a flash Memory, a magnetic disk, or an optical disk. Also stored in memory 102 are one or more modules configured to be executed by the one or more processors 109 to perform all or a portion of the steps of any of the methods shown in fig. 5, 6, and 7.
The power supply component 103 provides power to the various components of the terminal 100. The power components 103 may include a power management system, one or more power sources, and other components associated with generating, managing, and distributing power for the terminal 100.
The multimedia component 104 includes a screen providing an output interface between the terminal 100 and the user. In some embodiments, the screen may include an LCD (Liquid Crystal Display) and a TP (touch panel). If the screen includes a touch panel, the screen may be implemented as a touch screen to receive an input signal from a user. The touch panel includes one or more touch sensors to sense touch, slide, and gestures on the touch panel. The touch sensor may not only sense the boundary of a touch or slide action, but also detect the duration and pressure associated with the touch or slide operation.
The audio component 105 is configured to output and/or input audio signals. For example, the audio component 105 includes a microphone configured to receive external audio signals when the terminal 100 is in an operational mode, such as a call mode, a recording mode, and a voice recognition mode. The received audio signals may further be stored in the memory 102 or transmitted via the communication component 108. In some embodiments, audio component 105 also includes a speaker for outputting audio signals.
The sensor assembly 107 includes one or more sensors for providing various aspects of state assessment for the terminal 100. For example, the sensor assembly 107 can detect an open/close state of the terminal 100, a relative positioning of the components, a change in coordinates of the terminal 100 or a component of the terminal 100, and a change in temperature of the terminal 100. In some embodiments, the sensor assembly 107 may also include a magnetic sensor, a pressure sensor, or a temperature sensor.
The communication component 108 is configured to facilitate communications between the terminal 100 and other devices in a wired or wireless manner. The terminal 100 may access a Wireless network based on a communication standard, such as WiFi (Wireless-Fidelity), 2G or 3G, or a combination thereof. In an exemplary embodiment, the communication component 108 receives a broadcast signal or broadcast related information from an external broadcast management system via a broadcast channel. In an exemplary embodiment, the Communication component 108 further includes a Near Field Communication (NFC) module to facilitate short-range Communication. For example, the NFC module may be implemented based on an RFID (Radio Frequency Identification) technology, an IrDA (Infrared data association) technology, an UWB (Ultra-Wideband) technology, a BT (Bluetooth) technology, and other technologies.
In an exemplary embodiment, the terminal 100 may be implemented by one or more ASICs (Application specific integrated circuits), DSPs (Digital Signal processors), PLDs (Programmable Logic devices), FPGAs (Field Programmable gate arrays), controllers, micro-controllers, microprocessors or other electronic components for performing the above-described methods.
The specific manner in which the processor in the server in this embodiment performs operations has been described in detail in the embodiment related to the information encryption method, and will not be elaborated here.
Fig. 3 is a block diagram illustrating a structure of an intelligent home system according to an exemplary embodiment, and as shown in fig. 3, the intelligent home system includes: terminal 100, gateway 200 and house equipment 300, wherein:
when the terminal 100 generates control information according to the triggered control operation, the terminal acquires a key serial number sent by the gateway 200, selects a key from a preset key sequence to obtain an encryption key, encrypts the control information according to the encryption key, and sends the encrypted control information to the gateway 200;
when receiving the encrypted information sent by the terminal 100, the gateway 200 selects a decryption key from the key sequence according to the key sequence number sent by the gateway, decrypts the encrypted information by using the decryption key to obtain control information, and sends the control information to the related home equipment 300, so that the home equipment works according to the control information, and the gateway selects the decryption key according to the key sequence number to judge whether the information is true or false, thereby avoiding other terminals from knowing the encryption key of the control information or the decryption key of the encrypted information, and mistakenly controlling the related home equipment 300 when sending the encrypted information by spoofing, thereby ensuring the communication safety in the smart home system, and greatly improving the safety of controlling the related home equipment.
The home device 300 may be a home appliance such as an intelligent refrigerator and an intelligent air conditioner, or an intelligent home device such as an intelligent wall switch, an air conditioner companion, and an intelligent camera, and the specific implementation manner is not limited by this embodiment.
The terminal 100 and the gateway 200 can be in communication connection through local area networks such as ZIGBEE and bluetooth, and can also be in communication connection through external networks such as WIFI and 2G/3G/4G/5G.
When the terminal 100 and the gateway 200 are in communication connection through the lan, even if the terminal 100 cannot be connected to the extranet, the control of the home devices in the smart home system can be realized, and the communication connection is not limited by the quality of the extranet network, thereby greatly improving the convenience of the smart home system.
Optionally, fig. 4 is a block diagram of another smart home system shown in the embodiment corresponding to fig. 3, as shown in fig. 4, the smart home system further includes a cloud server 400, when the cloud server 400 is in communication connection with the terminal 100 and the gateway 200, the cloud server 400 sends key generation information to the terminal 100 and the gateway 200, and the terminal 100 and the gateway 200 generate an encryption key or a decryption key according to a key generation manner in the key generation information received by the terminal 100 and the gateway 200.
Fig. 5 is a flowchart illustrating an information encryption method according to an example embodiment, which may include the following steps, as shown in fig. 5.
In step S110, the terminal acquires the key serial number transmitted by the gateway when generating the control information according to the triggered control operation.
The control information is information for controlling a device related to the local area network.
As shown in the implementation environment diagram of fig. 1, a user operates an APP running in a terminal to generate corresponding control information.
There are various ways for the gateway to transmit the key serial number, and the key serial number may be transmitted to the terminal at a fixed frequency, may be transmitted when the terminal makes an inquiry to the gateway, or may be transmitted by other means.
It should be noted that the key serial numbers sent by the gateway each time are different, even if other terminals attack through spoofing when acquiring a key serial number for a certain time, the gateway generates a decryption key according to the new key serial number after receiving the encrypted information sent by other terminals, so that the encrypted information sent by other terminals cannot be decrypted, thereby further avoiding the attack of other terminals through spoofing, enabling the gateway to successfully decrypt the encrypted information sent by other terminals and mistakenly execute corresponding operations according to the control information obtained after decryption, and ensuring the security of controlling the relevant devices through the local area network.
In step S120, a key is selected from a preset key sequence according to the key sequence number to obtain an encryption key.
The key sequence is preset.
The key sequence comprises a sequential set of a plurality of keys, each key in the key sequence being different from each other.
The key may be a number, a phrase, or other forms, and the specific form of the key is not limited herein. For example, the key sequence is a sequence including 10 ten thousand mutually different numbers.
Therefore, a specific key can be selected from the key sequence according to a specific key sequence number.
The terminal has various ways of selecting the key from the preset key sequence according to the key sequence number, and can select the key sequenced as the key sequence number from the key sequence; or selecting a key before or after the key sequenced as the key serial number from a preset key sequence according to the key serial number; the key may also be selected from the preset key sequence according to the key sequence number in other manners, where a specific manner of selecting the key from the preset key sequence according to the key sequence number is not limited herein.
It should be noted that the key sequences in the terminal and the gateway may be identical or corresponding, that is, after the terminal encrypts information according to the key in the key sequence stored in the terminal, the gateway may successfully decrypt information according to the key in the key sequence stored in the gateway. That is, information encryption and information decryption can be performed by the same one key; the information can be encrypted by one key, and the information can be decrypted by another key corresponding to the encrypted key, so that the gateway can be ensured to be successfully decrypted after receiving the encrypted information.
In step S130, the control information is encrypted by the encryption key to obtain encrypted information.
It should be noted that, the terminal selects a key from a preset key sequence according to a key sequence number to obtain an encryption key for information encryption, and the gateway selects a key from the same key sequence according to the key sequence number to obtain a decryption key for information decryption, and since the key sequences are the same or corresponding, the key sequence numbers are the same, the gateway can successfully decrypt and obtain control information after receiving the encryption information.
In step S140, the encryption information is transmitted to the gateway.
By using the method, when the intelligent home system generates the control information according to the triggered control operation in the control process of the home equipment, the terminal selects the key from the preset key sequence according to the key sequence number sent by the acquisition gateway to obtain the encryption key, encrypts the control information according to the encryption key to obtain the encryption information, and sends the encryption information to the gateway, and because the key sequence number of the encryption key is sent by the gateway, the gateway can obtain the decryption key from the key sequence according to the key sequence number, and further can smoothly identify the control information after receiving the encryption information and decrypting through the decryption key, thereby realizing the encryption and decryption of the control information only through the transmission of the key sequence number, avoiding other terminals from knowing the encryption key of the control information or the decryption key of the encryption information, and when the encrypted information is sent by impersonation, the related household equipment is controlled by mistake, the communication safety in the intelligent household system is ensured, and the safety of controlling the related household equipment is greatly improved.
Optionally, fig. 6 is a detailed description of step S110 in the information encryption method shown in the corresponding embodiment of fig. 5, and as shown in fig. 6, step S110 in the information encryption method may further include the following steps.
In step S111, the terminal receives the key sequence number transmitted by the gateway at a preset time interval.
The time interval for the gateway to send the key sequence number is a preset time range value, the time interval cannot be set too large or too small, and the time interval can be finely adjusted in advance in an actual intelligent home system. In an exemplary embodiment, the time interval is preset to 5 seconds.
When the terminal receives the key serial number sent by the gateway at the fixed frequency, the terminal does not immediately acquire the key serial number and selects a key from a preset key sequence, and only when control information is generated according to triggered control operation, the terminal acquires the received key serial number.
When the terminal generates the control information according to the triggered control operation, the time consumed for encrypting the control information, the time consumed for sending the encrypted information to the gateway and the time consumed for receiving the encrypted information sent by the terminal by the gateway are all very short, so as long as the fixed frequency of sending the key serial number by the gateway is not very high, namely the interval time of sending the key serial number by the gateway is not very short, when the gateway receives the encrypted information sent by the terminal, the gateway can know that the terminal encrypts the key selected according to which key serial number the gateway sends.
In step S112, the key sequence number received at the time of generating the control information is acquired from the key sequence numbers transmitted by the receiving gateway.
By using the method, the gateway sends the key serial number to the terminal according to the preset time interval, so that when the terminal generates the control information, the terminal directly searches the latest received key serial number in the received key serial numbers sent by the gateway, the key serial number does not need to be specially inquired from the gateway, and the convenience of obtaining the key serial number is greatly improved.
Optionally, fig. 7 is another detailed description of step S110 in the information encryption method shown in the corresponding embodiment of fig. 5, and as shown in fig. 7, step S110 in the information encryption method may further include the following steps.
In step S114, the terminal transmits a key serial number acquisition request to the gateway when generating the control information.
In the local area network, the terminal sends a key serial number acquisition request to the gateway through the router.
The key serial number obtaining request is an instruction sent by the terminal to the gateway to request to obtain the key serial number.
In order to ensure that the gateway can successfully decrypt and obtain the control information after receiving the encrypted information, the key sequence number when the terminal selects the encryption key from the preset key sequence is the same as the key sequence number when the gateway selects the decryption key from the preset key sequence. Therefore, when the terminal generates the control information and needs to encrypt the key, the key serial number obtaining request is sent to the gateway to obtain the key serial number sent by the gateway, and then the encryption key is obtained by selecting from the preset key sequence according to the key serial number, so that the key serial number of the encryption key obtained by the terminal is ensured to be the same as the key serial number of the decryption key obtained by the gateway.
In step S115, the key serial number transmitted by the gateway in response to the key serial number acquisition request is received.
By using the method, when the terminal generates the control information, the terminal sends a key serial number acquisition request to the gateway, and requests the gateway to send the key serial number, so that the key serial number of the encryption key selected by the terminal from the preset key sequence is the same as the key serial number of the decryption key selected by the gateway, the gateway is further ensured to be capable of successfully decrypting to acquire the control information after receiving the encryption information sent by the terminal, and the encryption information sent by other terminals through spoofing cannot be successfully decrypted, the communication safety in the intelligent home system is ensured, and the safety of controlling related equipment in the intelligent home system is improved.
Fig. 8 is a flowchart illustrating an information encryption method according to an example embodiment, which may include the following steps, as shown in fig. 8.
In step S210, the gateway receives the encrypted information transmitted by the terminal.
The gateway receives the encrypted information sent by the terminal, and the terminal sends the encrypted information to the gateway through the local area network.
In step S220, in response to receiving the encrypted message, the gateway selects a key from a preset key sequence according to the key sequence number sent to the terminal, so as to obtain a decryption key.
When receiving the encrypted information sent by the terminal, the gateway immediately selects a key from a preset key sequence according to the key serial number sent to the terminal to obtain a decryption key.
Because the key serial numbers are the same and the preset key sequences are the same or corresponding, the gateway can successfully decrypt and obtain the identifiable control information after receiving the encrypted information.
In step S230, the control information is obtained by decrypting the encrypted information with the decryption key.
As mentioned above, the terminal encrypts the control information to obtain encrypted information. Therefore, the control information is obtained by decrypting the encrypted information with the decryption key.
If the encryption key for encrypting the control information by the gateway is the same as the decryption key for decrypting the encrypted information by the gateway, the control information obtained after decrypting the encrypted information by the decryption key can be identified, namely the encrypted information is effectively sent, and the gateway controls the related equipment according to the control information; if the encryption key for encrypting the control information by the gateway is different from the decryption key for decrypting the encrypted information by the gateway, the control information obtained by decrypting the encrypted information by the decryption key cannot be successfully identified, that is, the transmitted encrypted information is invalid. Therefore, when the gateway cannot identify the control information, the gateway indicates that the sent encryption information is invalid, and the gateway discards the control information and does not perform corresponding operation according to the control information.
In step S240, the control information is sent to the relevant home devices, so that the home devices operate according to the control information.
By using the method, when the gateway receives the encrypted information, the gateway selects the key from the preset key sequence according to the key serial number sent to the terminal to obtain the decryption key, and decrypts the encrypted information through the decryption key to obtain the control information.
Optionally, fig. 9 is a detailed description of step S240 in the information encryption method shown in the corresponding embodiment of fig. 8, and as shown in fig. 9, step S240 in the information encryption method may further include the following steps.
In step S241, when the control information is recognized, the relevant device is controlled in accordance with the control information.
In step S242, if the control information cannot be identified, the control information is discarded.
It will be appreciated that if the control information is obtained by successfully decrypting the encrypted information, the content of the control information can generally be successfully identified.
However, in order to avoid that the control information is sent to the related home devices without being able to identify the information content of the control information after the encrypted information is successfully decrypted, the operation of the home devices may be failed, and the home devices may be damaged.
Therefore, after the information content of the control information is successfully identified, the control information is sent to the relevant household equipment, and the safety of controlling the relevant household equipment is greatly improved.
And after the information content of the control information cannot be successfully identified, discarding the control information and not sending the control information to the related household equipment.
Fig. 10 is a schematic diagram illustrating a method for controlling home devices in an intelligent home system according to an exemplary embodiment.
In step S310, the terminal and the gateway respectively receive the key sequence sent by the cloud through communication connection with the cloud.
It can be understood that the encryption key or decryption key selected by the terminal and the gateway are both pre-stored in their respective storage in the form of a key sequence, and then the terminal selects the encryption key from the key sequence according to the key sequence number sent by the gateway and encrypts the control information by the encryption key, and after receiving the encrypted information, the gateway selects the decryption key from the key sequence to be stored by the key sequence number sent to the terminal by the gateway and decrypts the encrypted information according to the decryption key.
When the terminal and the gateway are in communication connection with the cloud for the first time, the cloud sends the key generation information containing the key generation mode to the terminal and the gateway respectively, and the key sequences received by the terminal and the gateway respectively are completely the same, so that the gateway can decrypt smoothly and identify the decrypted control information after encrypting the control information and sending the control information to the gateway.
In step S320, the terminal acquires the key serial number sent by the gateway when generating the control information according to the triggered control operation.
In step S330, the terminal selects a key from a preset key sequence according to the key sequence number to obtain an encryption key.
In step S340, the terminal encrypts the control information according to the encryption key to obtain encrypted information, and sends the encrypted information to the gateway.
In step S350, the gateway receives the encrypted information sent by the terminal, and selects a key from a preset key sequence according to a key sequence number sent to the terminal, so as to obtain a decryption key.
In step S360, the gateway decrypts the encrypted information by the decryption key to obtain the control information.
In step S370, upon recognizing the control information, the relevant device is controlled in accordance with the control information.
The following is an embodiment of the system of the present invention, which can be used to implement the above-mentioned embodiment of the information encryption method. For details that are not disclosed in the embodiments of the system of the present invention, refer to the embodiments of the information encryption method of the present invention.
Fig. 11 is a block diagram illustrating an information encryption apparatus according to an exemplary embodiment, which includes a key serial number obtaining module 110, an encryption key selecting module 120, an encryption module 130, and an encrypted information transmitting module 140, which are running in an application program of a terminal.
A key serial number obtaining module 110, configured to obtain, by the terminal, a key serial number sent by the gateway when the terminal generates control information according to the triggered control operation;
an encryption key selecting module 120, configured to select a key from a preset key sequence according to the key sequence number to obtain an encryption key;
the encryption module 130 is configured to encrypt the control information according to the encryption key to obtain encrypted information;
and an encryption information sending module 140, configured to send the encryption information to the gateway.
The implementation process of the functions and actions of each module in the above device is specifically described in the implementation process of the corresponding step in the above information encryption method, and is not described herein again.
Optionally, as shown in fig. 12, the key serial number obtaining module 110 further includes, but is not limited to: a key serial number receiving unit 111 and a first key serial number obtaining unit 112.
A key sequence number receiving unit 111, configured to receive, by the terminal, a key sequence number sent by the gateway according to a preset time interval;
a first key sequence number obtaining unit 112, configured to obtain, from the key sequence numbers received from the gateway, the key sequence number received when the control information is generated.
Optionally, as shown in fig. 13, the key serial number obtaining module 110 further includes, but is not limited to: a key serial number receiving unit 114 and a second key serial number obtaining unit 115.
A key serial number receiving unit 114, configured to send a key serial number obtaining request to the gateway when the terminal generates the control information;
a second key sequence number obtaining unit 115, configured to obtain the key sequence number sent by the gateway in response to the key sequence number obtaining request.
Fig. 14 is a block diagram illustrating another information encryption apparatus according to an exemplary embodiment, which includes an encrypted information receiving module 210, a decryption key selecting module 220, a decryption module 230, and a control information transmitting module 240 in an application program running in a gateway.
An encrypted information receiving module 210, configured to receive, by the gateway, encrypted information sent by the terminal;
a decryption key selection module 220, configured to respond to receiving of the encrypted information, and the gateway selects a key from a preset key sequence according to a key sequence number sent to the terminal, to obtain a decryption key;
a decryption module 230, configured to decrypt the encrypted information with the decryption key to obtain the control information;
and the control information sending module 240 is configured to send the control information to the relevant home devices, so that the home devices work according to the control information.
Optionally, as shown in fig. 15, the control information sending module 240 further includes but is not limited to: an information content reading unit 241 and a control information transmitting unit 242.
An information content reading unit 241 for reading the information content of the control information;
and a control information sending unit 242, configured to send the control information to the relevant household device when the information content is successfully identified, so that the household device operates according to the control information.
Optionally, the control information sending module 240 shown in fig. 15 further includes but is not limited to: and a control information discarding module.
And the control information discarding module is used for discarding the control information when the information content cannot be successfully identified.
Optionally, the present invention further provides a terminal, which executes all or part of the steps of the information encryption method shown in any one of fig. 5, fig. 6 and fig. 7. The terminal includes:
a processor; and
a memory communicatively coupled to the processor; wherein,
the memory stores readable instructions which, when executed by the processor, implement the method of any of the above exemplary embodiments.
The specific manner in which the processor in the terminal in this embodiment performs the operation has been described in detail in the embodiment related to the information encryption method, and will not be explained in detail here.
Optionally, the present invention further provides a gateway, which performs all or part of the steps of the information encryption method shown in any one of fig. 8 and 9. The gateway includes:
a processor; and
a memory communicatively coupled to the processor; wherein,
the memory stores readable instructions which, when executed by the processor, implement the method of any of the above exemplary embodiments.
The specific manner in which the processor in the gateway in this embodiment performs operations has been described in detail in the embodiment related to the information encryption method, and will not be elaborated here.
In an exemplary embodiment, a storage medium is also provided that is a computer-readable storage medium, such as may be temporary and non-temporary computer-readable storage media, including instructions. The storage medium includes, for example, the memory 102 of instructions executable by the processor 109 of the terminal 100 to perform the information encryption method described above.
It is to be understood that the invention is not limited to the precise arrangements described above and shown in the drawings, and that various modifications and changes may be effected therein by one skilled in the art without departing from the scope thereof. The scope of the invention is limited only by the appended claims.

Claims (15)

CN201711261222.9A2017-12-042017-12-04Intelligent domestic system and information ciphering method and device, terminalPendingCN107948178A (en)

Priority Applications (1)

Application NumberPriority DateFiling DateTitle
CN201711261222.9ACN107948178A (en)2017-12-042017-12-04Intelligent domestic system and information ciphering method and device, terminal

Applications Claiming Priority (1)

Application NumberPriority DateFiling DateTitle
CN201711261222.9ACN107948178A (en)2017-12-042017-12-04Intelligent domestic system and information ciphering method and device, terminal

Publications (1)

Publication NumberPublication Date
CN107948178Atrue CN107948178A (en)2018-04-20

Family

ID=61947485

Family Applications (1)

Application NumberTitlePriority DateFiling Date
CN201711261222.9APendingCN107948178A (en)2017-12-042017-12-04Intelligent domestic system and information ciphering method and device, terminal

Country Status (1)

CountryLink
CN (1)CN107948178A (en)

Cited By (9)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN108769009A (en)*2018-05-282018-11-06深圳和而泰数据资源与云技术有限公司Data communications method, smart machine and intelligent gateway
CN109039588A (en)*2018-10-162018-12-18深圳市华腾物联科技有限公司A kind of data safe transmission method and equipment based on block chain
CN111355683A (en)*2018-12-202020-06-30航天信息股份有限公司Method, device and storage medium for ensuring http data transmission safety
CN111431706A (en)*2020-03-182020-07-17中孚信息股份有限公司Method, system and equipment for improving SM4 algorithm speed by using FPGA logic
WO2021104448A1 (en)*2019-11-302021-06-03华为技术有限公司Method for synchronizing key information, system and device
CN113612775A (en)*2021-08-042021-11-05西安思安云创科技有限公司4C remote control safety protection method, device and system based on Internet of things equipment
CN113824688A (en)*2021-08-242021-12-21广州市瑞立德信息系统有限公司Encrypted communication method, network controller and access control system
CN113839958A (en)*2021-09-292021-12-24广州河东科技有限公司Communication encryption method and device for smart home, control system and storage medium
CN118713905A (en)*2024-07-162024-09-27上海腾你信息科技有限公司 Information transmission method and device

Citations (11)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN101820344A (en)*2010-03-232010-09-01中国电信股份有限公司AAA server, home network access method and system
CN102682506A (en)*2012-05-252012-09-19北京华大信安科技有限公司Intelligent Bluetooth door access control method and device based on symmetric cryptographic technique
CN104125124A (en)*2014-07-112014-10-29京信通信系统(中国)有限公司Smart home remote control method, device and system
CN104301303A (en)*2014-09-152015-01-21汕头大学 Security protection method and system for smart home internet of things
CN105227516A (en)*2014-05-282016-01-06中兴通讯股份有限公司The access method of Smart Home, control centre's equipment and dress terminal
CN105260668A (en)*2015-10-102016-01-20北京搜狗科技发展有限公司File encryption method and electronic device
CN105634729A (en)*2015-12-252016-06-01上海云丞聚智能科技有限公司Mobile phone encryption and decryption method based on bluetooth equipment
CN106100830A (en)*2016-05-242016-11-09飞天诚信科技股份有限公司A kind of method and apparatus writing seed key in NFC dynamic token
CN106817358A (en)*2015-12-022017-06-09阿里巴巴集团控股有限公司The encryption and decryption method and equipment of a kind of user resources
CN107195060A (en)*2017-07-072017-09-22东峡大通(北京)管理咨询有限公司The control system and method for a kind of intelligent bicycle lock, intelligent bicycle lock
CN107393066A (en)*2017-06-302017-11-24北京康得新创科技股份有限公司Unlocking method, terminal, server and the system for unlocking of smart lock

Patent Citations (11)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN101820344A (en)*2010-03-232010-09-01中国电信股份有限公司AAA server, home network access method and system
CN102682506A (en)*2012-05-252012-09-19北京华大信安科技有限公司Intelligent Bluetooth door access control method and device based on symmetric cryptographic technique
CN105227516A (en)*2014-05-282016-01-06中兴通讯股份有限公司The access method of Smart Home, control centre's equipment and dress terminal
CN104125124A (en)*2014-07-112014-10-29京信通信系统(中国)有限公司Smart home remote control method, device and system
CN104301303A (en)*2014-09-152015-01-21汕头大学 Security protection method and system for smart home internet of things
CN105260668A (en)*2015-10-102016-01-20北京搜狗科技发展有限公司File encryption method and electronic device
CN106817358A (en)*2015-12-022017-06-09阿里巴巴集团控股有限公司The encryption and decryption method and equipment of a kind of user resources
CN105634729A (en)*2015-12-252016-06-01上海云丞聚智能科技有限公司Mobile phone encryption and decryption method based on bluetooth equipment
CN106100830A (en)*2016-05-242016-11-09飞天诚信科技股份有限公司A kind of method and apparatus writing seed key in NFC dynamic token
CN107393066A (en)*2017-06-302017-11-24北京康得新创科技股份有限公司Unlocking method, terminal, server and the system for unlocking of smart lock
CN107195060A (en)*2017-07-072017-09-22东峡大通(北京)管理咨询有限公司The control system and method for a kind of intelligent bicycle lock, intelligent bicycle lock

Cited By (11)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN108769009A (en)*2018-05-282018-11-06深圳和而泰数据资源与云技术有限公司Data communications method, smart machine and intelligent gateway
CN109039588A (en)*2018-10-162018-12-18深圳市华腾物联科技有限公司A kind of data safe transmission method and equipment based on block chain
CN111355683A (en)*2018-12-202020-06-30航天信息股份有限公司Method, device and storage medium for ensuring http data transmission safety
WO2021104448A1 (en)*2019-11-302021-06-03华为技术有限公司Method for synchronizing key information, system and device
US12081971B2 (en)2019-11-302024-09-03Huawei Technologies Co., Ltd.Key information synchronization method and system, and device
CN111431706A (en)*2020-03-182020-07-17中孚信息股份有限公司Method, system and equipment for improving SM4 algorithm speed by using FPGA logic
CN111431706B (en)*2020-03-182023-07-28中孚信息股份有限公司Method, system and equipment for improving SM4 algorithm speed by using FPGA logic
CN113612775A (en)*2021-08-042021-11-05西安思安云创科技有限公司4C remote control safety protection method, device and system based on Internet of things equipment
CN113824688A (en)*2021-08-242021-12-21广州市瑞立德信息系统有限公司Encrypted communication method, network controller and access control system
CN113839958A (en)*2021-09-292021-12-24广州河东科技有限公司Communication encryption method and device for smart home, control system and storage medium
CN118713905A (en)*2024-07-162024-09-27上海腾你信息科技有限公司 Information transmission method and device

Similar Documents

PublicationPublication DateTitle
CN107948178A (en)Intelligent domestic system and information ciphering method and device, terminal
US11259178B2 (en)Bluetooth mesh network provisioning authentication
CN107947924A (en)Intelligent domestic system and information ciphering method and device, terminal
CN104993981B (en)Control the method and device of equipment access
CN104869612B (en)Access the method and device of network
EP3136648B1 (en)Method and device for determining control authority on user device
US9769667B2 (en)Methods for controlling smart device
CN107968736B (en) Smart home system and information encryption method, device and terminal
CN107070909A (en) Information sending method, information receiving method, device and system
CN106888206B (en)Key exchange method, device and system
CN105682253A (en) Method, device, terminal and computer-readable storage medium for establishing communication
CN104955031A (en)Information transmission method and device
CN105282158A (en)Intelligent equipment networking method, routing equipment, intelligent equipment and system
CN104301303A (en) Security protection method and system for smart home internet of things
CN106549939B (en)Data processing method and device for intelligent access control system
EP3182746A1 (en)Method and apparatus for transmitting routing information
WO2016173190A1 (en)Information providing method and device
CN110891299A (en)Network distribution method and device, electronic equipment and storage medium
CN106685644B (en)Communication encryption method and device, gateway, server, intelligent terminal and system
CN104009837A (en)Method and device for updating key and terminal
KR101575222B1 (en)System, service provider device, service user device and method for providing image of IP camera and computer program
CN105228141A (en)A kind of methods, devices and systems set up network and connect
CN104837178A (en)Network accessing method and device
TW201605203A (en)Home control gateway and home control network connection method thereof
CN105517102A (en)Method, device and equipment for enabling wireless network equipment to be connected with hot spot

Legal Events

DateCodeTitleDescription
PB01Publication
PB01Publication
SE01Entry into force of request for substantive examination
SE01Entry into force of request for substantive examination
RJ01Rejection of invention patent application after publication
RJ01Rejection of invention patent application after publication

Application publication date:20180420


[8]ページ先頭

©2009-2025 Movatter.jp